We Share Computing Power, Not Data. How Does Isolation Work in a Multi-Tenant Environment?
“Will our data be at risk if it runs alongside other customers’ workloads?” This concern is natural, but the reality today is much more complex. A well-designed multi-tenant architecture makes it possible to run even critical applications securely and efficiently. In the European context, however, the issue is not only isolation between customers, but also who has legal control over the data.
What Is Multi-Tenant Architecture
Multi-tenancy allows multiple customers to share common infrastructure — compute power, storage, network resources, and management interfaces. Each tenant, however, has its own isolated environment: separate network, access rules, databases, and monitoring. Simply put: we share the “building,” but the offices are locked and accessible only to authorized users.
For a clearer picture:
- Geetoo Cloud Compute – our Czech public cloud, where companies share infrastructure but each has its own dedicated environment.
- AWS, Azure – global platforms where hundreds of companies run on the same infrastructure, but their data and applications remain reliably isolated.
How Isolation Works
For a multi-tenant environment to be truly secure, tenants must be strictly separated on several levels. It’s not just about logical division, but about combining network, data, and application mechanisms that ensure one tenant’s activities cannot affect another.
- Network isolation – dedicated VLAN/VXLAN/VPC segments, edge routers with their own firewall/NAT configuration, and isolated routing when leaving the customer’s environment.
- Data isolation – encryption of data at rest and in transit (with the option to use your own encryption keys), plus separate storage spaces.
- IAM / RBAC – granular access rights so that every user has access only to what they really need. Some solutions even allow tenants to integrate with their own IAM system (such as Entra ID). This way, basic users can be limited to application access, network engineers to firewall configuration, and administrators to full control of all machines in their tenant.
- Hypervisor-level isolation – the hypervisor itself ensures that one user’s VMs or containers cannot affect anyone else’s and cannot read or write outside their own environment.
IAM and RBAC Explained
We’ve mentioned the terms IAM and RBAC—here’s a quick clarification:
- IAM (Identity and Access Management) – the framework for managing identities and access. In simple terms: it defines who can log in and how (password, MFA, SSO, certificates).
- RBAC (Role-Based Access Control) – access control based on roles. Instead of assigning rights individually to each user, you assign a role (e.g., “user,” “network engineer,” “administrator”), and that role carries a predefined set of permissions.
Example:- A standard user can only see their own application.
- A network engineer can configure firewalls.
- An administrator has full rights to all servers.
Our Approach
How do the principles of multi-tenancy and isolation translate into practice? At Geetoo we design our architecture to give customers the assurance that their environment is both secure and flexible.
Multi-tenancy is not a weakness if the architecture is designed properly. At Geetoo, every tenant runs in an isolated environment with its own network, security policies, and monitoring.
In practice, this means:
- Isolated routing and dedicated firewall instances for each customer — including the option to isolate within a single tenant if desired,
- encrypted storage and data flows,
- audit logs and transparent monitoring.
On top of this, our public cloud offers clear business benefits:
- PAYG (Pay As You Go) – pay only for what you actually use, with no hardware investment,
- fast start – new environments provisioned within hours,
- data centers in CZ and SK – three in the Czech Republic and one in Slovakia, ensuring true data sovereignty,
- high availability and multi-site backups,
- expert support 24/7, from a team that understands both infrastructure and your business.
For customers with higher requirements, we also provide private cloud—a single-tenant solution with dedicated infrastructure for just one client.
European Data Sovereignty
For European companies, the greater challenge today is not multi-tenancy, but who has legal access to data. The U.S. CLOUD Act allows American authorities to demand data from U.S. providers (such as Microsoft, Google, or Amazon) regardless of where that data is physically stored. Microsoft has admitted it cannot guarantee that U.S. authorities would not gain access to EU companies’ data, even if stored in Europe. This proves that physical data location alone is not enough — jurisdiction prevails.
When to Consider Private Cloud
The multi-tenant model is secure and efficient, but in some cases (e.g., banking, government, sensitive projects) a higher level of control is required. In such situations, private cloud is the ideal choice — data remains within the EU, the infrastructure is dedicated, and legally outside the reach of third-party authorities. Private cloud is also better suited for environments where specific configurations are required that may not be achievable within a public cloud.
Conclusion
Multi-tenant architecture — sharing infrastructure, not data — is secure and flexible when designed with the right standards. But in Europe, the discussion increasingly shifts to data sovereignty and legal control. Geetoo offers not only robust technical isolation, but also solutions designed with European legal and security needs in mind.